Based on the limited available information, teamxxx is a recently emerged ransomware group first observed in June 2025, appearing to be financially motivated based on their targeting patterns and operational characteristics. The group's origin and potential affiliations remain unclear due to their recent emergence and limited public documentation by major threat intelligence organizations. Their attack methodology and specific tools have not been extensively documented, though their diverse geographic targeting across the United States, Czech Republic, Hong Kong, Sweden, and Germany, combined with their focus on high-value sectors including healthcare, financial services, and hospitality suggests a financially-driven operation seeking maximum impact and payment potential. With only 12 known victims documented since their emergence, the group has not yet conducted any widely-publicized major campaigns that have drawn significant attention from law enforcement or security researchers. Given their recent first observation in June 2025, teamxxx appears to still be active, though their limited victim count and lack of extensive public reporting suggests they remain a relatively minor player in the current ransomware landscape. The group has been linked to 12 public disclosures across our corpus. First observed on a leak site on June 10, 2025; most recent post August 4, 2025. The operation is currently inactive.
Sector and geography
This disclosure adds to ransomware activity in the Financial Services sector, which has 516 disclosures indexed across all operators we track. Geographically, aetoscapitalasia.com is reported in HK, a country with 23 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.